CVE-2023-1829

Updated: 2025-02-13 22:54:30.774222

Description:

A use-after-free vulnerability in the Linux Kernel traffic control index filter (tcindex) can be exploited to achieve local privilege escalation. The tcindex_delete function which does not properly deactivate filters in case of a perfect hashes while deleting the underlying structure which can later lead to double freeing the structure. A local attacker user can use this vulnerability to elevate its privileges to root. We recommend upgrading past commit 8c710f75256bb3cf05ac7b1672c82b92c43f3d28.


Links NIST CIRCL RHEL Ubuntu

Severity

Severity Score
CVSS Version 2.x 0
CVSS Version 3.x HIGH 7.8

Status

OS name Project name Version Score Severity Status Errata Last updated

Statement

AlmaLinux 9.2 ESU kernel 5.14.0 7.8 HIGH Not Vulnerable 2024-01-19 16:11:10
AlmaLinux 9.2 FIPS kernel 5.14.0 7.8 HIGH Not Vulnerable 2024-01-19 16:10:09
CentOS 6 ELS kernel 2.6.32 7.8 HIGH Not Vulnerable 2023-04-29 03:23:40
CentOS 7 ELS kernel 3.10.0 7.8 HIGH Released CLSA-2024:1720468480 2024-07-23 17:32:02
CentOS 8.4 ELS kernel 4.18.0 7.8 HIGH Released CLSA-2023:1701963303 2023-12-07 16:18:41
CentOS 8.5 ELS kernel 4.18.0 7.8 HIGH Released CLSA-2023:1701962635 2023-12-07 16:18:41
CloudLinux 6 ELS kernel 2.6.32 7.8 HIGH Not Vulnerable 2023-04-29 03:23:40
Oracle Linux 6 ELS kernel 2.6.32 7.8 HIGH Not Vulnerable 2023-04-29 03:23:39
Ubuntu 16.04 ELS linux-hwe 4.15.0 7.8 HIGH Released CLSA-2023:1683295599 2023-05-05 11:05:22
Ubuntu 16.04 ELS linux 4.4.0 7.8 HIGH Released CLSA-2023:1684277390 2023-05-16 21:14:16
Total: 11